Presentation Abstract
Today’s business processes extend beyond the firewall. Here’s how companies are using enterprise security solutions to set policies that control who can access, and what they can do with, digital documents, regardless of where the information is stored or distributed, while monitoring document activity.